Documente Academic
Documente Profesional
Documente Cultură
e) Telemedicine Act 1997: This Act provides for regulation and control of the practice of
telemedicine in Malaysia with the aim to improve the healthcare services of society through ICT.
The Act also emphasises on the importance to obtain patients consent before giving him any
medical treatment.
f ) Communication and Multimedia Commission Act 1998 (CMCA): This Act has been enacted to
oversee the development of the communication and multimedia industry through the creation of
a Multimedia Commission. It also lists down several aims and national policy objectives in
section 3 of the Act.
g) Optical Discs Act 2000 (ODA): This Act provides for the licensing and regulation of the
manufacture of optical discs to combat piracy. It is used to prosecute criminals who produce
illegal copies of protected movies and music.
h) Electronic Commerce Act 2006: The aim of the Act is to boost electronic commerce activities
in and to enable Malaysian business activities to compete in the global economy. It also provides
legal recognition for electronic communications, electronic signatures and electronic documents.
i) Electronic Government Activities Act 2007 (Act 680): This Act applies to Federal laws and
legalizing the use of electronic message when dealing with the government. However, such use
is not compulsory to any person unless he consented to that method. There are also certain legal
requirements to be fulfilled by such electronic message. An Order was also passed in May 2010
and known as Electronic Government Activities (Prescription of Electronic Signature) Order
2010.
j) Personal Data Protection Act 2010: This Act applies to any person who processes and any
person who has control over or authorizes the processing of any personal data in respect of
commercial transactions. It also provides protection on the rights of data subject/data users.
2.3 Cyber activities, offences and consequences of violation of those laws
Cyber offences refer to offences committed using electronic means or by way of internet. The
medium includes hand phone and other electronic gadgets. Offences such as online defamation,
online child pornography, hacking, computer fraud, phishing or identity theft and violation of
privacy are among cyber attacks that had given bad effect to the society, economy and politics of
certain countries.
Blogging is one of the most active cyber activities that may expose bloggers to online criminal
defamation suits and civil defamation suit. Bloggers may also be suit for infringement of
copyrights.
2.3.1 Blogging, Online Criminal Defamation and sedition
Blogging is common nowadays but the bloggers must know the limits and restriction when
communicating in the internet. The following laws may be used to charged and prosecute
bloggers namely:
In Singapore a blogger, Gopalan Nair who is an American citizen and a former Singaporean
lawyer was sentenced to three months imprisonment on September 18, for insult under article
228 of Singapores Criminal Code. He was initially arrested on May 31 under article 13D of the
Miscellaneous Offences Act. Four days after his arrest, he was charged with sedition for
criticizing two judges on his blog. In fact, a week before Nairs sentence was handed down, the
attorney general initiated contempt of court proceedings against the publisher of the Asian
edition of the Wall Street Journal and two of its editors on the allegation that their editorial
impugn the impartiality, integrity and independence of the Singapore judiciary. Both were
sentenced to jail terms of 12 and 10 days respectively for contempt of court on 3 June 2008.
Other cases involving bloggers include six bloggers who were charged for insulting the Sultan of
Perak and a former EON Bank Bhd employee, Seah Boon Khim, who pleaded guilty in the
Sessions Court for posting an obscene blog title to embarrass his former boss. He was fined
RM8,000 and in default two months jail by the Sessions Court.
2.3.2 Online child pornography
This offence is committed by using and targeting children as victim since they are easy to be
influenced by cyber criminal. In the US Child pornography has long been treated severely under
both federal and state law. The following Acts has been enacted to prevent online child
pornography:
1. Child Pornography Prevention Act (CPPA) of 1996, designed both to close loopholes in
existing federal child pornography law and address new technological issues by the following:
Criminalizing the act of knowingly possessing, selling, receiving, sending, or
transmitting child pornography via the internet or e-mail.
Criminalizing so-called virtual depictions of child pornography, those that appear to
involve minors and those created by computer graphics software.
2. The Protection of Children from Sexual Predators Act of 1998 contains further anti-child porn
provisions. Title II of the law contains the following provisions:
Provides for the prosecution of individuals for the production of child pornography if the
visual depiction was produced with materials that have been mailed, shipped, or
transported in interstate or foreign commerce, including by computer.
Tightens previous federal law by making it a criminal offense to possess for even one
depiction of child pornography
Outlines responsibilities for Internet Service Providers in reporting child pornography to
Authorities
Increases federal criminal penalties for child pornography, which include fines and prison
sentences ranging from 15 to 30 years
3. The Protection Act of 2003
nationwide emergency system to alert the public about missing children, and
wiretappping and electronic surveillance in the investigation of children pornography.
4. Child Online Protection Bill (COPA)
The Bill has the purpose of restricting access by minors to any material defined as
harmful to such minors on the Internet. The United States Federal Courts have ruled that
the law violates the constitutional protection of free speech, Therefore have blocked it
from taking effect. COPA required all commercial distributors of material harmful to
minors to restrict their sites from access by minors. Material harmful to minors was
defined as material that by contemporary community standards was judged to appeal to
the prurient interest and that showed sexual acts or nudity (including female breasts).
This is a much broader standard than obscenity.
2.3.3 Hacking
This offence involves unauthorised access to others computer system. The hacker may be
charged either under section 3 or sec 4 of the Computer Crime Act 1997. Section 3 deals with
unauthorized access offence while section 4 deals with unauthorised access with intent or
aggravated hacking. The penalty for offence committed under section 3 is liable to a fine not
exceeding fifty thousand ringgit or to imprisonment for a term not exceeding five years or to
both while section 4 emphasis on the unauthorised access with the intention to commit fraud or
dishonesty or to cause injury as defined by the Penal Code. Nevertheless the Act is silent on the
punishment for repeated offences. Stiffer punishment is provided under sec 4 in the amount of
fine not exceeding one hundred and fifty thousand ringgit or face imprisonment for a term not
exceeding ten years or both.
2.3.4 Computer fraud
This financial crime is a traditional crime but now it may be committed via internet. There is no
specific cyberlaw provision in Malaysia governing this crime but the suspect is usually
investigated according to Criminal Procedure Code and charged under the Penal Code. Other
than the laws, there is a need for financial institutions to adopt integrated approach in fighting the
crime where in the industry, the technology experts and the enforcement agency should work
together.
2.3.5 Identity theft or Phishing
An identity theft is also known as phishing. This crime usually involves online or Internet
banking whereby the fraudsters will send dubious e-mails or create spoof websites hoping to
entice users to hand over their credit card or banking details. There is no specific provision of
law on this type of crime but this crime could cause billions of losses.
2.3.6 Privacy
Privacy can be defined as a right to be alone and free from any disturbance. There are many
types of privacy such as information privacy that requires data protection law to protect it, bodily
privacy, privacy of communications and territorial privacy. The law that may be applicable is the
Personal Data Protection Act 2010. For violating ones privacy, a person can be charged under
Section 509 of the Penal Code which provides criminal penalties for insulting the modesty of any
person or intruding upon the privacy of [any] person by uttering any word, sound or gesture, or
exhibiting any object, intending that such word or sound shall be heard, or that such gesture or
object shall be seen by such person.
2.4 Effects of cyber offences and the remedies available for victims
Cyber laws enacted in Malaysia provide for criminal punishment against cyber offenders. Cyber
laws as seen above provide stiffer punishment in the form of imprisonment and fines. This
nevertheless will benefit not be sufficient redress for the individual victims. Thus what kind of
remedies available for the victims? Most judicial system has two system of justice namely the
criminal justice system and the civil justice system. While criminal justice determines the guilt or
innocence of the offender, civiljustice system ascertains whether the wrong doer is liable for the
injuries suffered by the victims.
a. For online defamation the victims suffers injury to reputation and thus may claim for
damages as provided under the Defamation Act 1957 and an injunction may be sought to prevent
further or repeat publication of the defamatory message.
This signifies that a blogger or any person who published defamatory words online may be
subjected to two types of legal suit namely criminal defamation and the other is civil defamation.
b. Hacking unauthorised access to the computer system may entitle the victims to have
remedies provided under the law of torts such as:
i. trespass into property
ii. intrusion
iii. breach of duty if it is committed by employee who has no authority to obtain the information
c. Computer fraud in cases involving a fraudulent investment scheme for example, the victims
may apply for mareva injunction to freeze the assets and prevents the scammer from having
access to the assets pending disposal of the case in court. The Court in Canada for example has
authority to issue a worldwide mareva injunction to preserve assets which are physically
located outside the courts jurisdiction. Mareva order may also be issued against any financial
institution which was believed to have the scammers accounts within the institutions. The
application must be made promptly in order to stop the scammers from dissipating with the
assets.
d. Identity theft or phishing. The victim may sue for loss suffered by him nevertheless the cause
of action must be clearly established.
e. Privacy Privacy is not recognised in Malaysia nevertheless it argued that privacy right
should be recognised as one of the important principles under human rights. Islam however
recognisedand protects individual privacy. With the enactment of Personal Data Protection Act
2010, this may be the basis for civil action that involved infringement of personal data.
3.0 CONCLUSION
There are several laws governing the cyber world that computer users should be aware of. While
ethics guide the behaviour of computer users, the law regulate and impose punishment for
offender and those who abuse, manipulate and misuse the usage of computer and the internet.
Nevertheless the most effected is usually the victims, the possible solution would be taking civil
actions against the wrong doer and claim for damages for the loss suffered
.
REFERENCES
Abu Bakar Munir & Siti Hajar Mohd. Yasin, Would the phishers get hooked?. Paper presented
at 22nd BILETA Conference, 16-17 April 2007, Hertfordshire.
Aishath Muneeza, The milestone of blogs and bloggers in Malaysia, [2010] 3 MLJ cvii.
Association for Computing Machinery, Inc. Association for Computing Machinery: Code of
Ethics. http:// en.wikipedia.org/wiki/Computer_ethics, accessed on 16th July 2010.
Cybercrimes cost billions in losses, New Straits Times (Computimes) Online,1 MMarch, 2004.
http://www.ctimes.com.my/
Computer ethics and legal issues at http://www.freewebs.com. Association for Computing
Machinery, Inc. Association for Computing Machinery: Code of Ethics
Dr Mahathir bin Mohamad, Foreword note in Abu Bakar Munir. Cyber Law, Policies and
Challenges, 1999. Butterworth Asia. Kuala Lumpur.
G Jack Bologna and Paul Shaw, Avoiding cyberfraud in small businesses: what auditors and
owners need to know, at 61.
Halim Shafie, Updates on the Malaysian cyber laws framework, 3rd International Cyber laws
Conference: Advancing Cyber laws: educate, regulate, practice and enforce, 2-3 March 2004,
Kuala
Lumpur.
For
further
information
see
the
MCMC,
http://www.mcmc.gov.my/the_law/legislation.asp accessed on 13 June 2005.
Halim Shafie, Updates on the Malaysian cyber laws framework, 3rd International Cyber laws
Conference: Advancing Cyber laws: educate, regulate, practice and enforce, 2-3 March 2004,
Kuala Lumpur. For further information see the MCMC,
http://www.mcmc.gov.my/the_law/legislation.asp> viewed on 13 June 2005.
http://en.wikipedia.org/wiki/Computer_ethics retrieved 16th July 2010.
http://www.acm.org/about/code-ofethics
http://en.wikipedia.org/wiki/Computer_ethics retrieved 16th July 2010.
http://en.wikipedia.org/wiki/Cyberlaw
http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics retrieved 16th July
2010. See also http://www.freewebs.com
Jo Timbuong, Integrated Solution needed to fight fraud effectively, InTech, the STAR, 3rd
August 2010 at IT18.
Joanna Loy, Privacy: Des it exist in Malaysia? Is it time to legislate?, 11 March 2009 at
http://www.malaysianbar.org.my retrieved 22 July 2010
Joseph Loh, Tweet below the Law, Sunday Star, 8 August 2010 F17.
Julian Ding, E Commerce: Law and Practice, Sweet & Maxwell Asia, 1999, at 201 and Zinatul
Ashikin A. Zainol,
Electronic commerce: A comparative analysis of the Malaysian Digital Signature Act 1997 and
the Singapore Electronic Transaction Act 1998, 15th BILETA Conference; Electronic Datasets
and access to legal information,
14th April 2000, http://www.bileta.ac.uk/00papers/zainol.html viewed on 14 November 2002.
Mageswari, M, 2009, IT Auditor Pleads Guilty to Slamming his Ex-boss in Websiteat
http://thestar.com.my/news/ story.
Margaret A Healy, Child pornography: An international perspective, 2 August 2004, via
Computer Crime Research Center (CCRC), http://www.crime-research.org/articles/536
Meryam Dhaboiwala, Legal system used to silence bloggers, suppress freedom of expression at
http://www.ethicsinaction.asia/archive/2008-ethics-in-action/vol.-2-no.-5-october-2008/legalsystems-used-tosilence-bloggers-suppress retrieved 23 July 2010.
N Ben Fairweather, Commentary on the ten commandments for computer ethics at
http://www.ccsr.cse.dmu.ac.uk/resources/professionalism/codes/cei_command_com.html
retrieved 16th July 2010
Navaseelan Balasingam v Public Prosecutor [2007] 1 SLR 767.- on illegal withdrawal from
ATM machines.
Nehaluddin Ahmad, Truth about identity fraud: Defence and safeguards, [2009] 9 CLJ i.
Nehaluddin Ahmad, The right to privacy and challenges: A critical review, [2008]5 MLJ cxxi
Ramon C. Barquin In Pursuit of a Ten Commandments for Computer Ethics
http://en.wikipedia.org/wiki/
Ten_Commandments_of_Computer_Ethics, accessed on 16th July 2010
Sabrina Mohamed Hashim, Blogging - Are You Exposing Yourself To Legal Liabilities?
[2007]2 CLJ i
Shah,
AS,
Six
Charged
for
Insulting
Perak
Sultanat
http://sultanazlan
shah.blogspot.com/2009/02/six-chargedfor-insulting-perak-sultan.html.
Supt Lim Hong Shuan, White Collar Crime in Malaysia at http://mpk.rmp.gov.my/jurnal/2005/
whitecollarcrime.pdf retrieved 23 July 2010.